Tampilkan postingan dengan label Malicious Software. Tampilkan semua postingan
Tampilkan postingan dengan label Malicious Software. Tampilkan semua postingan

Rabu, 18 April 2012

Anti malicious websites

The Chinese government wants all personal computers sold in the country must have software that can block dangerous situ-site.

Site blocking software is intended to cover the sites, especially pornography. This rule is an effort to protect the younger generation of content that is considered harmful

Software
called "Green Dam Youth Escort" will block access to sites banned by the government by plugging it into the database. The developed software company Jinhui Computer System Engineering Co. in cooperation with the Beijing Dazheng Human Language Technology Academy Co. Ministry of Industry and Information Technology Ministry of China has decided to take this step on May 19 last, but until now the policy is not yet implemented the Chinese government.

Jumat, 26 Juni 2009

Worm

Worm considered closely associated with the following programs that can mereplikasi himself and send a copy from computer to computer via a network connection. Once arrived, mereplikasi for the worm is activated and propagasi again. In addition propagasi, worms usually do not want that function.

Network worm uses to spread the relationship network of sitem to other systems. Once active on a system, network worms can apply as bacteria or viruses, or trojan horse program paste or a number of actions to annoy or destroy.

Mereplikasi for himself, the network worm uses a network service, such as:
- Electronic mail facilities,
- A remote execution capability,
- The ability to login remotely.

Response :
  1. Always do a Scan for disk into your PC. Although seemingly trivial, but that this will be a small help to protect your computer from viruses transmitted through exchange of floppy disks switch. If a PC infected by a virus, then inserted the disk to them, will most likely be infected as well. Therefore, do not carelessly open the floppy on the computer belonging to your friend, before the floppy disks that pass the selection scandisk.
  2. Scan the CD into your CD drive. Although it seems more exclusive and secure, but also a CD that has the potential are the same as floppy disks, transmit the virus. Therefore, do not dally! Stay do a scan on a CD that will be installed on your computer, even though the CD was recently purchased from the store.
  3. Make a scan of your hard drive, every time you will begin to work with it. As always checked the five health, your PC must also always be whether the healthy or have been infected by the virus. Moreover with the conduct of the hard disk scan before starting a job, you reduce the risk of disruption caused by the virus during the process of your work. In addition, there is the chance occurrence of damage to your files.
  4. Protect your disk, if you include them in your PC to other people. As mentioned above, if you are forced to enter the disk in your computer to other people, then you need to protected floppy first. Consequently, you can not make changes to files stored on floppy disks are.
  5. Do not indiscriminate downloading attachment. Nowadays many types of worm that sends copies of itself in e-mail attachment. For example, worm Miss world. Therefore you should not open any attachment if the sender address does not you know.
  6. Selective in opening e-mail. The same laws that apply to open in the e-mail. a number of viruses and worms duplicate itself and send copies to the entire e-mail address listed on the Microsoft Outlook address book computer diserangnya Express. Thus, the potential victim will not be put with suspicion and will soon open the e-mail is toxic.
  7. Install and to update the antivirus program on your computer. Sometimes, people are still common in the computer, the feel is secure if it is to install Norton or MacAffee program. You are wrong! Antivirus program has also expired the period such as food cans. Therefore, you should always be to update your antivirus program. because antivirus programs that have expired, will not have more teeth to keep out the virus attack on your computer.
  8. Always follow the news about the latest viruses. Period has expired addition, anti-virus program is also always an update with respect to virus-virus, which continues in the new-release. Experts continue to do development for rival who is also the creator of the virus-race competition to create a more vicious virus from day to day.
  9. Download Microsoft Outlook Security Patch into your computer system. As is known, does not have the perfect software program. That is, there are certain weak point or a bug in the software. as well as going to the Microsoft Outlook Express application. Therefore, with download Microsoft Outlook Security Patch into your computer system, means that you have overcome a bug in the program.
  10. Disabling Windows Scripting Host. As known, many new viruses and worms that developed with visual basic scripting system under windows. To minimize attacks, you should disable the program that works for mengotomatisasi a function. However, please note that not all speak vbs virus can disable the program on hold with this

Virus

Meaning the term virus is considered closely associated with the following code that is placed in a program that causes pengkopian inserted himself to one or more other programs. Program menginfeksi other programs to modify the programs. Modify the program including inserting copies of the virus program can then menginfeksi other programs. Besides only propagasi, one of this malicious programs usually perform the function that is not desired.

Like biological viruses, computer virus found on the instruction code that can make perfect copies, such as himself. When the infected computer related (contact) with software that has not been infected, the virus copies to enter the new program. Infection can spread from one computer to another through the use of this disk, or send the program through the network. In the network environment, the ability to access applications and services computer facility is perfect spread of the virus.

A virus can be routine-a routine that diisikan by virus programmers. Routine routine-this could include the destruction or just display a message

Handling virus
To prevent the occurrence of virus attack, antivirus software is usually installed in the operating system such as the Mine did, AVG, PC-Cillin, Norton Symantec, and others. But the use of anti-virus is not the only way to avoid virus attacks. We need to know that the virus constantly growing both in terms of attack and the damage caused. All bekerjanya characteristics of the virus outside of computer users. Therefore, some of the things that computer users should be made in an effort to prevent virus attacks, among others.

  • To update the antivirus through the Internet or from a package file that is distributed. Usually antivirus update with ability to provide programs and update the database because finding a new virus. If the antivirus is not updated, the antivirus is able to prevent the attack of virus-virus generation old, virus-virus sehinngga new generation will be easy to do the distribution. Update process is better done as often as possible, but if it does not enable the update is done in most long range within 2 weeks.
  • Be careful in the transformation of the file either through floppy disk, hard disk, flash disk, network or the other. Before Peng-an-copy files, scanning should be done to the files concerned to ensure that the file will not copy in-bervirus.
  • If the computer connected to the network should be as individual protective firewall. When this virus-the virus usually attacks the network through the TCP / IP or peer-to-peer. In addition the firewall can also provide the password on the folders that are shared. Restriction policy implementation of centralized network systems will create a more secure.
  • Use e-mail client like Microsoft Outlook, Mozilla Thunderbird, Eudora, and others need to pay attention to each incoming email into the inbox. The spread of the virus via email, including methods that often occur. Inclusion on an email attachment to provide opportunities for effective penetration of the virus in the operating system.
  • Surfing the internet memeliki risk is high enough to attack the virus. Many websites that install hidden applications so that when the website is accessible to the application will perform pentarasi virus in the operating system to the unwitting user. Use of web browser software system that has security as a popup blocker is recommended.
  • Microsoft Windows provide a software-software that works to improve the weakness of the system. To update the operating system security system can reduce the risk of virus dissemination.

Next steps to be implemented so that the system can work normally again.
  • When the system is infected, do the backup data.
  • Scan a hard drive infected with a computer virus-free.
  • If damage occurs after scanning the system, so the system can not work, do the re-installation.
  • Scan the data in the backup computer with a virus-free.
  • Install antivirus program or the latest update.
  • Update antivirus database program.
  • Update the system security operating system.

Trojan horse

Meaning the term is considered closely associated with the following Routine not be documented in a secret program useful. Programs that contain useful hidden code that when executed perform a function that is not desired. Execution of the program routine execution of this secret.

Trojan horse program used to perform functions which are not direct the user is not authorized can not do directly. For instance can access files on another system is used together, users can create a trojan horse program. Trojan horse programs executed when this change will permit license-file so that files can be read by any user.

Trojan horse programs that are difficult to detect that the compiler is modified so that the insert additional code to certain programs when compiled, such as the login program. Trapdoor on the code to create programs that allow creators to login to the system log using a special password. Trojan horse is never can be found only if the program source.

Motifasi of trojan horse is crushing data. The program appears to function as a useful function, such as a calculator, but also to secretly remove the files. Trojan horse to the regular program or routine-routine taken from the BBS, the Internet, and so forth.

Trapdoor

Trapdoor considered closely associated with the following entry point not documented in a secret program to access these methods without Authentication normal. Trapdoor has been used correctly for years by programmers to find program errors.

Programmers to create or eliminate the authority of special needs and setup Authentication. Trapdoor is a code that receives a specific input line or triggered by running the user ID or a particular line.

Trapdoor to be used when the threat of malicious programmers to get the initialization is not authorized.

Logic bomb

One of the program that placed the evil computer program that checks a set of conditions in the system. When conditions are found, executing a logic function that produces actions not authorized.

Logic bomb on a stick to the official program that is set explode when certain conditions met. Example of conditions to trigger the logic bomb is there or not there is a certain file, a particular day of the week or date, or the user to run a particular application. Once triggered, bomb or change or delete all data files, the engine stopped, the destruction or other.

Bacteria


One of the bad programs that consume system resources with mereplikasi himself. Bacteria do not destroy the file explicitly. Goal of this program is only one, namely mereplikasi himself. The program is simple bacteria can only execute two copies itself simultaneously on the system or multiprograming create two new files, each copy is a copy program files bacteria. The two copies then copy this two times, and so on.

Bacteria reproduce exponentially in, quickly took over the entire processing capacity, memory or disk space, lead to the rejection of this initialization to resources (resource).

Keylogger

Keylogger is make in 2 types of the Software and Hardware, both of them have different characteristics with the same goal. Example Keylogger software is shaped Invisible Keylogger, KGB Keylogger, Stealth Keylogger and. This software can be installed on the victim computer to automatically and this software will hide himself so as not known by the victim. Victims will not be able to see this program is running, because all the software Keylogger offers Hide mode (Hide mode) that will not display the icon, the name of the program on the task manager and more. Many also used the Trojan hacker who works as a Keylogger like Back Orifice, Netbus, Sub Seven, etc..

The lack of software Keylogger is keberadaanya can be detected by the programs anti-spyware and antivirus like Norton, Spycop, Whoa € ™ s Watching me, etc.. While the form of easy-to-use Keylogger that is not detected and anti-spyware and anti virus is a hardware Keylogger. Hardware Keylogger can also work on any operating system and even the operating system's login password can also be recorded
Basically, any type, anywhere and with any Operating System does not affect the hardware Keylogger. All typing is done first through akan Keylogger hardware that has been inserted before flowed to the computer itself. Because of the form of hardware, then install Keylogger for this type of required physical access to the computer trying to install. If you want to install a computer that is located in Africa, you must be clear to Africa to install the hardware Keylogger is. Inillah reason why many hardware Keylogger is not known in general, and of course this can be an advantage for the hackers, even in Indonesia have not found a shop that sells this product Keylogger hardware.

Some sites, among others, the Keylogger www.keyghost.com, www.amecisco.com, and www.keyloggersdirect.com. Hardware Keylogger usually installed between the original keyboard cable connector and the mouse port on the computer. Because, in general, at this time using the keyboard PS2 and USB connectors, hardware Keylogger is also available in 2 types of the PS2 and USB. Type Keylogger is a kind of relative easily detected by looking at the physical computer keyboard cable is being used. However, sometimes the computer-public computers such as Microsoft to install the locker so that the computer does not enable us to mengeceknya and this makes the play at the internet cafe to be very vulnerable to tapping. With the way this is all the encryption and strong as any serumit become useless and can be easily stolen. According to my hardware Keylogger can not be working on a laptop, a laptop keyboard does not use the PS2 and USB connection alias directly. That I do.

How Overcoming Keylogger

Keylogger offers 2 forms of the Hardware and Software with karakterisitik create a very different technique to detect and prevent also different. First opportunity to hear to avoid Keylogger Software can use the Virtual Keyboard that can be accessed through the Accessories menu â € "Accessibility â €" On-Screen Keyboard. Use the Virtual Keyboard is not useful for the Keylogger Software for Virtual Keyboard still send the text to be displayed on the program and this text will be recorded by Keylogger Software, and Keylogger can also capture the display text is.

However, the virtual keyboard is very powerful and useful to prevent hardware Keylogger, because the text does not diketikkan akan through the keyboard and the original cable and not through a keyboard port that has been Hardware Keylogger. Or to avoid hardware Keylogger, you can use the keyboard that take you from your own home ... ? and to prevent the Software Keylogger, you can use anti-spyware programs or antivirus which always ter-update.

Other steps that can be done is to find the hidden directory, because usually the Keylogger to make a hidden directory that is not known by the user, but this step can also help us to know of the existence of a program that is not desired. To do this, run the command "dir / ah / s" in the Command Prompt will show all files and directories that are hidden.

Here are five ways you can do to detect and prevent spyware:
  1. Installing a filter on the host spyware. Many spyware scanner available in the market. If you find a solution that is not too expensive, try using Microsoft beta tool, Windows Spywares, Spybot, and AdAware. Many commercial anti-virus vendors such as McAfee, spyware filter, also has to be combined in a corporate anti-virus solutions.
  2. Installing an application content filtering gateware with spyware. If the level of host before, so now we see spyware solution that operates on the network level. One of them is Spyware Interceptero Blue coat. If your budget is adequate, consider using this solution.
  3. Create an egress filter on your network. There is no one to create a filter on the network egress. They can help in the spyware that tries to block the "call home".
  4. Monitor Intrusion-detection system (IDS) and keep your signature is still the latest. if you can not block the spyware from a house call, at least you can mendeteksinya with IDS, and use the report to identify the infected system.
  5. Prevent user mengistalasi software download. Most are caused by the installation of spyware that users install the software that is downloaded from the internet. If possible awasi activity.

Spyware authorities and similar data is one of the most important yand challenges faced by information security professionals. It is time to ensure your organization is safe. By following the steps above will help you in achieving that goal.

Malicious Software

Users of computer systems already have the data and information of value for him. Protecting this data from the parties has no right is important for the operating system. This is called the security (security). An operating system has some aspects of security. Aspects of this deal, especially with the loss of data. Computer systems and data in the aspect of the threat risk (threats), aspects of it (intruders), and natural aspects.

Aspects of the threat, the general system face the threat of opening the computer data secrecy, data-conversion data by the person who does not have the right, also with the system pelumpuhan Denial of Service (DoS). Aspects of it, at this time many people trying to enter into an operating system with a variety of purposes. There is simply trying to penetrate the operating system (hacking), who have tried to take advantage of the action penjebolah (cracking). Disusupi not only by humans, the operating system is also facing threats from the security program it, which is called malicious programs or malware. Malicious programs that is to infiltrate in the operating system and have goals such as taking personal data, the computer takes over, and often destructive aims. Including the category is a malicious virus, Keylogger, worm, trojan, and spyware, Trapdoor, Logic bomb bacteria.

Finally, the operating system and data in it is threatened from things non-technical, that is from the natural. Operating system due to the threat of natural disasters (floods, mud, heat, earthquake, etc.), damage to hardware or software, even omission of the users. The development of the internet at this time to bring the consequences of the increased risk of operating system security. Therefore, the operating system must have the resilience of the security. For most developers operating system at this time, security is one of the main problems.

Category of Malicous Software :
1. Keylogger
2. Virus
3. Logic Bomb
4. Trapdoor
5. Trojan horse